Product | Role Name | Role Types | Role Entity |
---|---|---|---|
Data Lake Compute | DLC_QCSLinkedRoleInCheckDLCResource | Service-Related Roles | checkdlcresource.dlc.cloud.tencent.com |
Use Cases: The current role is the DLC service role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cos:GetService",
"cos:GetBucket",
"cos:ListMultipartUploads",
"cos:GetObject*",
"cos:HeadObject",
"cos:GetBucketObjectVersions",
"cos:OptionsObject",
"cos:ListParts",
"cos:DeleteObject",
"cos:PostObject",
"cos:PostObjectRestore",
"cos:PutObject*",
"cos:InitiateMultipartUpload",
"cos:UploadPart",
"cos:UploadPartCopy",
"cos:CompleteMultipartUpload",
"cos:AbortMultipartUpload",
"cos:DeleteMultipleObjects",
"cos:AppendObject",
"cos:HeadBucket",
"vpc:DescribeRouteTable",
"vpc:CreateRoute",
"vpc:AcceptVpcPeeringConnection",
"vpc:CreateVpcPeeringConnectionEx",
"vpc:CreateVpcPeeringConnection",
"vpc:DeleteVpcPeeringConnection",
"vpc:DeleteVpcPeeringConnectionEx",
"vpc:AcceptVpcPeeringConnectionEx",
"vpc:DescribeVpcPeeringConnections",
"cloudaudit:DescribeEvents",
"cos:GetBucket*",
"cos:PutBucket*",
"cos:DeleteBucket*",
"cos:RenameObject",
"monitor:GetMonitorData",
"chdfs:DescribeMountPoint",
"chdfs:DescribeFileSystem",
"chdfs:DescribeAccessGroups",
"chdfs:DescribeAccessRules",
"chdfs:ModifyFileSystem",
"chdfs:ModifyAccessRules",
"chdfs:CreateAccessGroup",
"chdfs:CreateAccessRules",
"chdfs:AssociateAccessGroups",
"chdfs:DisassociateAccessGroups",
"chdfs:DeleteAccessGroup",
"chdfs:DeleteAccessRules",
"vpc:DescribeAssistantCidr",
"vpc:DescribeVpcEx",
"chdfs:DescribeMountPoints",
"oceanus:DescribeWorkSpaces",
"oceanus:DescribeClusters",
"oceanus:DescribeCHDFSAccessGroups",
"oceanus:CreateCHDFSAccessGroup",
"vpc:DescribeVpcEndPoint",
"vpc:CreateVpcEndPoint",
"vpc:DeleteVpcEndPoint"
],
"resource": "*"
}
]
}
Was this page helpful?